Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 14:34

General

  • Target

    c2a31e51b7a2ba5d54ec582307379aee1b057871eab566aa69a84a833b72b282.dll

  • Size

    4.1MB

  • MD5

    ff0f6d04ff530a97c0645b82497c4e1a

  • SHA1

    7c528978d18bfe26a07df9be100cb5eae29d52f6

  • SHA256

    c2a31e51b7a2ba5d54ec582307379aee1b057871eab566aa69a84a833b72b282

  • SHA512

    5aca84f48ca0ecb0c0a63ad956be2e4b4a8a416351abcce901a03a85c10d8bab17ada3db0a09921e93306c7e4fcd3542a50f91e632a6cd7869a62bfe795983d6

  • SSDEEP

    98304:kXN7GVdqqs5b+YX8WWQEqaDb/rGZePAWHpeVzSoj9ghi1RebMIg9Cbk/Vr:kX5GVlsdLWJDJ4WHpeV+ojDIg9Cbk/Vr

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c2a31e51b7a2ba5d54ec582307379aee1b057871eab566aa69a84a833b72b282.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c2a31e51b7a2ba5d54ec582307379aee1b057871eab566aa69a84a833b72b282.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads